• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: remote access

Token Theft

Hackers are Increasing Token Theft Attacks to Bypass MFA

Microsoft says it has seen an increase in attackers utilizing token theft to compromise identities that have completed MFA.

November 22, 2022 Zachary Comeau Leave a Comment

Organizations are increasing their implementation of multifactor authentication (MFA) to help secure account credentials and prevent unauthorized access, but threat actors are similarly advancing their techniques and are finding ways around those protections, including stealing tokens, according to Microsoft. In a recent post, Microsoft says its Detection and Response Team has seen an increase in […]

Read More

Cisco Chicago Office Meeting room

9 Tips for Unified Communications Success

Every company is working to find a hybrid work solution, which means productivity tools are no longer a “nice-to-have” but a “must-have.”

November 1, 2022 Joel Stocker Leave a Comment

Every company is working to find a hybrid work solution, which means productivity tools are no longer a “nice-to-have” but a “must-have.” Shockingly, most organizations just deployed something in haste to adapt to work during the pandemic. Using disparate tools that don’t fit into long-term plans, most companies don’t have a way to monitor, update, […]

Read More

IT news, This Week in it, Microsoft, Google, Gmail, ISE 2023,

This Week in IT: Google Innovations, Dell Edge Platform, Surface Devices, Security Spending

Google and Microsoft product announcements, a new Dell edge platform and data on security spending highlight this week's IT news.

October 13, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology stories each week. Google Cloud Next ’22 announcements Google announced […]

Read More

VMware EXSi security

U.S. Agencies Warn of Ransomware Attacks on K-12 Education Sector

K-12 institutions should take action now to protect against an increase in ransomware as the school year begins, U.S. agencies say.

September 7, 2022 Zachary Comeau Leave a Comment

U.S. agencies are warning of an increase in ransomware attacks against the K-12 education sector, singling out a relatively new threat actor that has been observed disproportionately targeting school systems as they welcome students back into their buildings. That threat actor is Vice Society—an intrusion, exfiltration and extortion hacking group that first appeared in summer […]

Read More

Microsoft Fortra healthcare ransomware

Microsoft: This is How to Protect Against Ransomware

Microsoft says securing identities, hardening cloud infrastructure and leveraging comprehensive security tools will help protect against ransomware.

September 1, 2022 Zachary Comeau Leave a Comment

Microsoft has outlined its three strategies to protect against ransomware and the growing as-a-service cybercrime economy that has taken hold among ransomware groups. As well as investing in “integrated threat protection across devices, identities, apps, email, data and the cloud,” Microsoft suggests organizations take three key strategies to protect against ransomware, including preparing a defense […]

Read More

cybersecurity mesh architecture CSMA, ZTA

Building a Foundation for Zero Trust with Cybersecurity Mesh

A cybersecurity mesh architecture (CSMA) goes beyond ZTA and suggests a deeper, better integrated layer of security.

August 31, 2022 Wes Wright Leave a Comment

It seems like there are more acronyms, labels and methods for bolstering security than ever before – and making sense of them all is proving to be just as complex as the infrastructure they’re meant to secure. One widely embraced term, zero-trust architecture (ZTA), calls for continually vetting users as they access different applications and […]

Read More

Person using LG's new laptop desk

What to Expect at LG’s Booth at VMWare Explore 2022

LG will be showcasing a variety of laptops, thin clients, zero clients and desktop monitors at VMWare Explore 2022, booth #1915.

August 24, 2022 TD Staff Leave a Comment

LG Business Solutions USA, the Linconshire, Ill.-headquartered B2B tech solutions provider will be at VMware Explore 2022. Its booth will feature 18 thin client laptops, all-in-one desktop computers, ergonomic monitors and zero client desktop solutions ideally suited for hybrid work spaces, healthcare workstations and call centers. Visitors to LG’s booth (#1601) at the Aug. 29-Sept. […]

Read More

Google, Bard

Google Releases Curated Detections in Chronicle

Curated detections in the Chronicle SecOps Suite are designed to help organizations detect sophisticated attacks and reduce alert fatigue.

August 18, 2022 Zachary Comeau Leave a Comment

Google is launching the general availability of curated detections as part of its Chronicle SecOps Suite to help organizations detect sophisticated attacks and make up for the shortage of cybersecurity talent. According to the company, the detections are built by the Google Cloud Threat Intelligence team and are actively maintained to reduce manual toil in […]

Read More

TeamViewer

TeamViewer Launches RealWear Integration

TeamViewer integration allows a subscriber’s IT professionals to remotely setup, configure and analyze a fleet of RealWear devices.

August 17, 2022 Zachary Comeau Leave a Comment

Remote access, control and monitoring provider TeamViewer is adding onto its partnership with assisted reality wearable solution provider RealWear with a new integration into the RealWear Cloud designed to assist frontline industrial workers. The TeamViewer software will be delivered as RealWear Cloud Assistance, an embedded service in RealWear Cloud that provides real-time technical support and […]

Read More

Cloudflare Phishing

How One Large Tech Company Thwarted a Highly Sophisticated Phishing Attack

Cloudflare says a reliance on physical security keys, robust cybersecurity tools and awareness helped stop a sophisticated phishing attack.

August 11, 2022 Zachary Comeau Leave a Comment

Phishing attacks are becoming all too common, and they are becoming increasingly sophisticated, leveraging text messages to trick employees not clicking links. However, the use of multi-factor security keys, robust security practices and a strong culture of security can help thwart them, as evidenced by a recent attack against Cloudflare. The web performance and security […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 11
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • Interim pages omitted …
  • Page 126
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.